期刊文献+

自动信任协商中信任证存储策略研究 被引量:1

Research on Credential Storage Strategy in Automated Trust Negotiation
下载PDF
导出
摘要 分布式信任证存储策略存在单点失效及容错性差等问题,可能导致信任证丢失。为此,提出一种改进的分布式存储策略。该策略以分布式存储策略为基础,运用已有的数据结构支持信任证存储策略的设计。基于资源冗余的思想,采用多信任证副本和信任证恢复机制,提升系统容错能力。实验结果表明,该存储策略具有较好存储均衡性。 Aiming at the problem of single-point failure which may lead to loss of credentials and poor fault-tolerance in distributed storage strategies, an improved distributed storage strategy is proposed. Using distributed storage strategies as a basis, exiting data structures is used to support the design of the credential storage strategy. Based on the idea of resource redundancy, multiple credential copies and credential recovery mechanism are employed. Experimental results show the storage strategy has increased fault-tolerance and balanced storage.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第12期140-143,共4页 Computer Engineering
基金 哈尔滨工程大学研究生培养基金资助项目"跨安全域信任模型关键技术研究"
关键词 多信任证副本 信任证恢复机制 容错性 存储均衡性 multiple credential copy credential recovery mechanism fault tolerance storage balance
  • 相关文献

参考文献5

二级参考文献43

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2Li NH,Winsborough WH,Mitchell JC.Distributed credential chain discovery in trust management.Journal of Computer Security,2003,11(1):35-86.
  • 3Li NH,Mitchell JC.RT:A role-based trust-management framework.In:Proc.of the 3rd DARPA Information Survivability Conf.and Exposition.Washington,IEEE Computer Society Press,2003.201-212.http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
  • 4Clarke D,Elien JE,Ellison C,Fredette M,Morcos A,Rivest R.Certificate chain discovery in SPKI/SDSI.Journal of Computer Security,2001,9(4):285-322.
  • 5Aura T.Fast access control decisions from delegation certificate databases.In:Proc.of the 3rd Australasian Conf.on Information Security and Privacy (ACISP '98).Brisbane:Springer-Verlag,1998.284-295.http://research.microsoft.com/users/tuomaura/Publications/aura-acisp98.pdf
  • 6Ellison C,Frantz B,Lampson B,Rivest R,Thomas B,Ylonen T.SPKI certificate theory.Internet RFC 2693,1999.
  • 7Jim T.SD3:A trust management system with certificate evaluation.In:Proc.of the 2001 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2001.106-115.
  • 8Li NH,Mitchell UC,Winsborough WH.Design of a role-based trust-management framework.In:Proc.of the 2002 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2002.114-130.http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
  • 9Ajmani S,Clarke DE,Moh CH,Richman S.ConChord:Cooperative SDSI certificate storage and name resolution.In:Proc.of the 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS 2002).Cambridge:Springer-Verlag,2002.141-154.http://pmg.csail.mit.edu/~ajmani/papers/lncs2429.pdf
  • 10Ellison C.SPKI Requirements.Internet RFC 2692,1999.

共引文献23

同被引文献12

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部